Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
Communications of the ACM
Identity-Based Encryption from the Weil Pairing
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
An Identity Based Encryption Scheme Based on Quadratic Residues
Proceedings of the 8th IMA International Conference on Cryptography and Coding
Toward Secure Key Distribution in Truly Ad-Hoc Networks
SAINT-W '03 Proceedings of the 2003 Symposium on Applications and the Internet Workshops (SAINT'03 Workshops)
Providing Robust and Ubiquitous Security Support for Mobile Ad Hoc Networks
ICNP '01 Proceedings of the Ninth International Conference on Network Protocols
Threshold and Identity-based Key Management and Authentication for Wireless Ad Hoc Networks
ITCC '04 Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04) Volume 2 - Volume 2
Constructing identity-based cryptosystems for discrete logarithm based cryptosystems
Journal of Network and Computer Applications
Security Issues in Wireless Mesh Networks
MUE '07 Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering
An Identity-Based Security Architecture for Wireless Mesh Networks
NPC '07 Proceedings of the 2007 IFIP International Conference on Network and Parallel Computing Workshops
Wireless mesh networks: a survey
Computer Networks: The International Journal of Computer and Telecommunications Networking
Cryptography and Network Security: Principles and Practice
Cryptography and Network Security: Principles and Practice
The nominal capacity of wireless mesh networks
IEEE Wireless Communications
The capacity of wireless networks
IEEE Transactions on Information Theory
ARSA: An Attack-Resilient Security Architecture for Multihop Wireless Mesh Networks
IEEE Journal on Selected Areas in Communications
IEEE Network: The Magazine of Global Internetworking
Hi-index | 0.00 |
In this paper, we propose a secure and efficient key establishment scheme designed with respect to the unique requirements of Wireless Mesh Networks. Our security model is based on Identity-based key establishment scheme without the utilization of a trusted authority for private key operations. Rather, this task is performed by a collaboration of users; a threshold number of users come together in a coalition so that they generate the private key. We performed simulative performance evaluation in order to show the effect of both the network size and the threshold value. Results show a tradeoff between resiliency and efficiency: increasing the threshold value or the number of mesh nodes also increases the resiliency but negatively effects the efficiency. For threshold values smaller than 8 and for number of mesh nodes in between 40 and 100, at least 90% of the mesh nodes can compute their private keys within at most 70 seconds. On the other hand, at threshold value 8, an increase in the number of mesh nodes from 40 to 100 results in 25% increase in the rate of successful private key generations.